{"id":"CVE-2024-25438","details":"A cross-site scripting (XSS) vulnerability in the Submission module of Pkp Ojs v3.3 allows attackers to execute arbitrary web scripts or HTML via a crafted payload injected into the Input subject field under the Add Discussion function.","modified":"2026-04-09T10:01:29.052536Z","published":"2024-03-01T23:15:08.457Z","references":[{"type":"WEB","url":"https://drive.google.com/file/d/1-9yUkbsQ-blYpTsdZoXfu3ALBA5wQCbG/view?usp=sharing"},{"type":"EVIDENCE","url":"https://github.com/machisri/CVEs-and-Vulnerabilities/blob/main/CVE-2024-25438%20-%3E%20Stored%20XSS%20in%20input%20Subject%20of%20the%20Add%20Discussion%20Component%20under%20Submissions"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/pkp/ojs","events":[{"introduced":"0"},{"last_affected":"0f0b736bfa612d94c2b9643e161cbb8b80ff05a8"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"3.3.0-0"}]}}],"versions":["3_2_0-0","3_3_0-0","ojs-2_0_0-0","ojs-2_0_1-0","ojs-2_0_2-0","ojs-2_0_2-1","ojs-2_1_0-0","ojs-2_1_0-1","ojs-2_1_1-0","ojs-2_1_1rc4","ojs-2_1b","ojs-2_2_0-0","ojs-2_2_0-b1","ojs-2_2_0-b2","ojs-2_2_1-0","ojs-2_2_1-b1","ojs-2_3_0-0","ojs-2_3_0-0rc1","ojs-2_3_3-0","ojs-2_3_3-1","ojs-2_4_0-0","ojs-3_0a1","ojs-3_0b1","ojs2-base-2_2_2"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2024-25438.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}]}